Viw Magazine

Business Coach

.

  • Written by Richard Matthews, PhD Candidate, University of Adelaide

Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys.

If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular system updates. The best providers of IT managed services can be a great help in maintaining uptime.

Unfortunately, these measures might not protect you from malicious attacks that enter your systems through everyday devices.

On the evening of Friday the 24th of October 2008 Richard C. Schaeffer Jr, the NSA’s top computer systems protection officer was in a briefing with US President George W. Bush when an aide passed him a note. The note was brief and to the point. They had been hacked.

How did it happen? The culprit was a simple USB.


Read more: Australia's car industry needs cybersecurity rules to deal with the hacking threat


USB supply chain attacks

The attack was unexpected because classified military systems are not connected to outside networks. The source was isolated to a worm loaded onto a USB key that had been carefully set up and left in large numbers to be purchased from a local internet kiosk.

This is an example of a supply chain attack, which focuses on the least secure elements in an organisation’s supply chain.

The US military immediately moved to ban USB drives in the field. Some years later, the US would use the same tactic to breach and disrupt Iran’s nuclear weapons program in an attack that has now been dubbed Stuxnet.

The lesson is clear: if you are plugging USB drives into your systems, you need to be very sure where they came from and what’s on them.

If a supplier can get a secret payload onto a USB stick, then there is no safe period in which a USB is a good choice. For example, you can currently buy a USB stick that is secretly a small computer, and it will, on insertion, open up a window on your machine and play the Death Star march.

This is just one kind of supply chain attack. What are the other kinds?

Network supply chain attacks

Computer users have an increasing tendency to store all their information on a network, concentrating their assets in one place. In this scenario, if one computer is compromised then the entire system is open to an attacker.

Consider a conference phone used in your organisation. Suppose this network-enabled phone had a built in fault that would allow attackers to listen in on any conversations in the vicinity. This was the reality in 2012 when more than 16 versions of Cisco’s popular IP phone were affected. Cisco released a patch for their phones, which could be installed by most companies’ IT security departments.

The basic model of a network supply chain attack shows how vulnerable interconnected systems are within an organisation. Author Supplied

In 2017, a similar issue arose when a brand of hospital grade dishwasher was affected by a built-in insecure web server. In the case of a hospital, there is a great deal of private data and specialist equipment that could be compromised by such a vulnerability. While a patch was eventually released, it required a specialised service technician to upload it.


Read more: Guarding against the possible Spectre in every machine


Supply chain attacks have recently been implicated in the disastrous failure rate of the North Korean missile program. David Kennedy, in a video for The Insider, discusses how the US has previously disrupted nuclear programs using cyber. If they still possess this capability, it’s possible they would wish to keep it covert. Should this be the case, it’s conceivable one of the numerous North Korean failures could have been a test of such a cyber weapon.

Five ways companies can protect themselves

To protect yourself against all of this you need to set up basic cyber hygiene processes that can help keep your business free from infection.

  1. Purchase and install good anti-virus software and run it in protective mode, where it scans everything on your machine. Yes, even Macs get viruses

  2. monitor who is on your network, avoid using untrusted devices such as USBs and have your administrators block autorun as a system-wide policy

  3. segregate your networks. Have critical plant infrastructure? Don’t have it on the same network as your day to day, public-facing or guest access networks

  4. update regularly. Don’t worry about the latest and greatest issues, patch the known vulnerabilities in your systems – especially that one from 1980

  5. pay for your software and labour. If you’re not paying for the product, then someone is paying for you as the product.

By separating your critical infrastructure from the internet facing and supplier available networks it is possible to provide a level of protection. However, some attacks are able to bridge this ‘air gap’. Author Provided

Cyber awareness is crucial

Finally, you can maximise cyber resilience by training everyone in your organisation to learn new skills. But it’s vital to test whether your training is working. Use actual exercises – in conjunction with security professionals – to examine your organisation, practice those skills, and work out where you need to make improvements.


Read more: Everyone falls for fake emails: lessons from cybersecurity summer school


The price of any connection to the internet is that it’s vulnerable to attack. But as we’ve shown, not even standalone systems are safe. Deliberate practice and thoughtful approaches to security can increase the protection of your business or workplace.

Richard Matthews is an elected member of Council at The University of Adelaide. He is a member of the South Australian branch of the Labor Party and a Graduate Member of the Institute of Engineers Australia.

Nick Falkner receives funding from The University of Adelaide as an Associate Professor of Computer Science and as the Director of the Australian Smart Cities Consortium. He is or has been named on grants in security related areas from the Australian Research Council.

Authors: Richard Matthews, PhD Candidate, University of Adelaide

Read more http://theconversation.com/how-suppliers-of-everyday-devices-make-you-vulnerable-to-cyber-attack-and-what-to-do-about-it-98254

Revolutionizing Manufacturing: Unleashing the Full Potential of Stereolithography SLA 3D Printing

3D printing is changing how we make things, and Stereolithography (SLA) 3D printing is at the center of this change. Making models or prot...

Impact of Early Intervention on Hearing-Impaired Children

Early intervention plays a crucial role in shaping the lives of children with hearing impairments, providing them with the necessary suppo...

The Role of a Mortgage Broker in Handling Your Reverse Mortgage

Choosing the right reverse mortgage can be a daunting task, especially given the multitude of options and complex terms involved. A mortga...

Showcasing Craftsmanship in Sydney's Furniture Outlets

Seeking an appropriate furnishing is the first step towards accomplishing perfect interior layout in Sydney, a colourful city where styl...

Blue Stars FX Review – The Benefits of Using an Advanced Online Brokerage Firm

If you are a seasoned trader in the dynamic world of crypto trading, then you understand that it is crucial to have a trading platform by ...

Maxon365 Review - (maxon365.com) Is Maxon 365 Scam or a Proper Broker?

The crypto trading arena is considered to be highly volatile and unpredictable. Hence, to keep up with the changing dynamics of the market...

Scrap Copper Secrets: Unlocking Melbourne's Pricing Patterns

In the heart of Melbourne's bustling urban landscape lies a hidden world of scrap metal, where discarded treasures await their chance at r...

Setting Up The Home Game Room Of Your Dreams

Everybody likes to play games, for some, it's a pleasant occasional pass time, for some, it's a regular good-natured competition with frie...

What is the best Ethernet Cable to satisfy your networking needs?

Whether you are a seasoned IT professional or a novice enthusiast, understanding something about ethernet cables can significantly impact ...

The Top 10 Reasons to Purchase a Makeup Mirror

Investing in a quality makeup mirror is a game-changer for anyone who applies makeup, grooms, or simply wants a better view when taking ca...

Understanding TPD Claims: Navigating the Process and Securing Your Entitlements

Total and Permanent Disability (TPD) claims serve as a vital resource for individuals facing significant injuries or illnesses that hinder...

Brisbane Personal Injury Lawyers: Advocates for Your Rights and Compensation

When you've suffered a personal injury in Brisbane, navigating the legal landscape can be daunting. That's where Brisbane personal injury ...

How Does Salary Sacrificing Save Money?

By strategically sacrificing salary, you save money through tax benefits and boosted take-home pay. Lower taxable income means less tax ...

Tips for Reducing Mould in Your Caravan

To prevent mould in your caravan, ensure good ventilation by opening windows and using fans. Keep airflow constant, especially when cookin...

Navigating the Aftermath: What to Do When You're in a Car Accident

Car accidents can be unsettling and chaotic experiences, often leaving individuals overwhelmed and unsure of what steps to take next. Howe...

Smart Mirrors: Revolutionizing Your Morning Routine with High-Tech Features

In today’s fast-paced world, technology seamlessly integrates into every aspect of our daily lives, aiming to enhance convenience and ef...

Brisbane to Face Another Gribbly Winter

Queensland has experienced another wet, hot summer, and in Brisbane, this means populations of pest species will be booming. For many pest...

Common Household Electrical Problems

Ever had a rough day just because you had an electrical problem at your residential property?  Imagine a fine morning, when you are read...

Important Instructions for Australians Living in Camper Trailers

Living in a camper trailer offers Australians a unique way to embrace adventure and freedom while exploring the vast and beautiful landsca...

Maintaining Your Mini Digger: Tips for Longevity and Performance

If you're a proud owner or operator of a mini digger in Australia, you understand the importance of keeping your equipment in top-notch co...

Tomorrow Business Growth